Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp2823457pxb; Tue, 24 Aug 2021 08:24:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyU+a5md0BJrjFuKOfChstHcPSYlV/m9tZH8vnWggSVQRKcT8KUI7x126u2Pc6PlJkUHMZV X-Received: by 2002:aa7:ce87:: with SMTP id y7mr43849237edv.306.1629818672402; Tue, 24 Aug 2021 08:24:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629818672; cv=none; d=google.com; s=arc-20160816; b=KKYueMoKLw6y7ubKxpNKDz1Tc+Lm6Ir7n9LDOn2OXYhfQMpujs37EHmNaEKriSSP8y slxV9klHr+y9WmZT4UJ9Yc4w60q6QM5o4haWhiEtLd7rpsJDqlS9CNqIoe1m2XLi0xTu lCzJom5HVhe3JY+mo5qGcRP/uE/QcYO1hWRodUeNh0m5L9ZjLGOJbVZfVRsYjmzP1VhQ m76Z46n3tn43mgg/+esaZPCkRDzuh0f515B+i+vYHtDxGx9wVg62zaYpDH/Hpf9GMGMV f/mXFPT7IBug2vZ49SnVG6rmyXsDPEnn9nrMBcIc19pX87BdApaswvq2QCvu3CsHRUvx rCkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=AlWf418OhmiZZMN2ujHNQZWc18fzFQ+ab1INkCf29Dg=; b=lq8ucQOLh3L08+dlBvh3xbTOUMshK+jzsUZK+hybJLkB9iMho749U7Q1l0vdFiXDfX EUG3FGYkh6fdAzkd9NWGs7mXB+OoZmf7m28uqcYvc5azmK2RuF1/dBubsR9pBXJgmmff 4cTkoggHFIG32YkDPYaGMiyyr4BFWceKxQ94v1LCvr+/JF3LxLYUYR3Z5/wWBiDNeohu yOhXfAv5Z7Btwx+DjKdDz8OSFZ7AmFFYo1JvzTiUbfGt6SWnsBLT87JNkiRxyk8fd1sb conutZNCysnvHcmetY/QOXIwfeFiL+yeG/ALa/J3/tctNUfngFcJK6PS6GTZuk0dLI5l cLew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gateworks-com.20150623.gappssmtp.com header.s=20150623 header.b=h9B4MYL0; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i12si17292020edu.543.2021.08.24.08.24.00; Tue, 24 Aug 2021 08:24:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gateworks-com.20150623.gappssmtp.com header.s=20150623 header.b=h9B4MYL0; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238224AbhHXPY3 (ORCPT + 99 others); Tue, 24 Aug 2021 11:24:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34126 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238211AbhHXPY2 (ORCPT ); Tue, 24 Aug 2021 11:24:28 -0400 Received: from mail-pj1-x1034.google.com (mail-pj1-x1034.google.com [IPv6:2607:f8b0:4864:20::1034]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 42175C0613C1 for ; Tue, 24 Aug 2021 08:23:44 -0700 (PDT) Received: by mail-pj1-x1034.google.com with SMTP id om1-20020a17090b3a8100b0017941c44ce4so2012817pjb.3 for ; Tue, 24 Aug 2021 08:23:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gateworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=AlWf418OhmiZZMN2ujHNQZWc18fzFQ+ab1INkCf29Dg=; b=h9B4MYL0ZHRCwtAFt9WLYquuLvRZY3ZCCd0XIomoYvZ/jkoNVJdc55k62FFnuwd1r7 KLVHJ+ivYOKxQrgspcN15/GAG+WeLPPJioIeu8kDX54oEdLsMc/JZNEdqZ/SYYbK8f/V dd4Td0t3+cqb3J819AV3cgKAch6vromBXLeFAxkK8rhiUa64HUXUrBYx8mimYFdFfHEr +EHk2SA9hz8QZIMc5JdR6bknuXL2VZRYGm1aVlobZlv/qwoE4gBtuJQoSDriV11cXUZk hXIFqqZX0mmem3uOXznck4OCoDYL3CDtoesGzW8jRiWOrAbAM4CrGYRtg6npSuOR+iPp ejvw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=AlWf418OhmiZZMN2ujHNQZWc18fzFQ+ab1INkCf29Dg=; b=KzmemQIW/ydmDZEXP4UmrcQie29ieKzioIAkbC6N5gp40CgjR/FrtVD8u5PouDKmUo DE/MdDFKAL62QgEejolOzuiFlO4+4yk2iGXhuzWKt52ccWSL/iYruQBSb+6mEMHNdOvw wweQTIJ/DkZhsccnzP5R52mJEphTaBmggDtayCWg8FSyLbffdPXj9NwWypumXW1kHitI WolEKYZZJgBfgW2yPf1IxNu7umpfOiNOzHwwaFMF2Ty+8mC3YXsNn0TdcrphtaP7etHf 4nmwKDpZvwtoMdhSHIAfWwcotfOau4WA+NukfR/EGUkqnpsXMTniVV6ksWOhHGHxhYWg HqOw== X-Gm-Message-State: AOAM531y89OBb2zohW8DWEUZUcGrZ8SFkvgUSJ2OZMss1bP/J/zAm3cv MMFzNZbEeii0c9pGA6oB7w5QNRw7RZ3GZeZZ1ZcTsQ== X-Received: by 2002:a17:902:bd81:b029:12c:b6fb:feef with SMTP id q1-20020a170902bd81b029012cb6fbfeefmr33981892pls.84.1629818623699; Tue, 24 Aug 2021 08:23:43 -0700 (PDT) MIME-Version: 1.0 References: <2b48a848-d70b-9c43-5ca0-9ab72622ed12@pengutronix.de> <9200d46d-94a2-befd-e9b0-93036e56eb8a@pengutronix.de> <8b559c9c-a4c0-d335-5e54-40b9acc08707@pengutronix.de> In-Reply-To: <8b559c9c-a4c0-d335-5e54-40b9acc08707@pengutronix.de> From: Tim Harvey Date: Tue, 24 Aug 2021 08:23:32 -0700 Message-ID: Subject: Re: [PATCH 0/4] KEYS: trusted: Introduce support for NXP CAAM-based trusted keys To: Ahmad Fatoum Cc: David Gstir , Aymen Sghaier , Mimi Zohar , Jan Luebbe , keyrings@vger.kernel.org, Steffen Trumtrar , linux-security-module@vger.kernel.org, Udit Agarwal , Herbert Xu , =?UTF-8?Q?Horia_Geant=C4=83?= , Richard Weinberger , James Morris , Eric Biggers , "Serge E. Hallyn" , Sumit Garg , James Bottomley , Franck LENORMAND , David Howells , open list , Jarkko Sakkinen , linux-crypto@vger.kernel.org, Sascha Hauer , linux-integrity@vger.kernel.org, "David S. Miller" Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Aug 24, 2021 at 12:33 AM Ahmad Fatoum wrote: > > On 23.08.21 19:50, Tim Harvey wrote: > > On Mon, Aug 23, 2021 at 6:29 AM Ahmad Fatoum wrote: > >> On 20.08.21 23:19, Tim Harvey wrote: > >>> On Fri, Aug 20, 2021 at 1:36 PM Ahmad Fatoum wrote: > >>>> On 20.08.21 22:20, Tim Harvey wrote: > >>> It works for a user keyring but not a session keyring... does that > >>> explain anything? > >>> # keyctl add trusted mykey 'new 32' @u > >>> 941210782 > >>> # keyctl print 941210782 > >>> 83b7845cb45216496aead9ee2c6a406f587d64aad47bddc539d8947a247e618798d9306b36398b5dc2722a4c3f220a3a763ee175f6bd64758fdd49ca4db597e8ce328121b60edbba9b8d8d55056be896 > >>> # keyctl add trusted mykey 'new 32' @s > >>> 310571960 > >>> # keyctl print 310571960 > >>> keyctl_read_alloc: Unknown error 126 > >> > >> Both sequences work for me. > >> > >> My getty is started by systemd. I think systemd allocates a new session > >> keyring for the getty that's inherited by the shell and the commands I run > >> it in. If you don't do that, each command will get its own session key. > >> > >>> Sorry, I'm still trying to wrap my head around the differences in > >>> keyrings and trusted vs user keys. > >> > >> No problem. HTH. > > > > Ahmad, > > > > Ok that explains it - my testing is using a very basic buildroot > > ramdisk rootfs. If I do a 'keyctl new_session' first I can use the > > system keyring fine as well. > > Great. Does this mean I can get your Tested-by: ? :) > Absolutely, For the series: I tested this series on top of v5.14.rc-7 on a Gateworks imx8mm-venice-gw73xx board with kernel param trusted.source=caam and keyutils-1.6: # keyctl new_session 22544757 # keyctl add trusted mykey 'new 32' @s 160701809 # keyctl print 160701809 990e03aa4515aee420eede17e26a58d0c5568c8bd2c9c2ee2f22a0583181d20d4f65cf9cb1f944a3cc92c0e3184a44a29a7e511f0a55a6af11a70ac2b2924514002475e73ae09820042896b9ee00a5ec Tested-By: Tim Harvey One more question: I've got a user that wants to blob/deblob generic data. They can use the caam_encap_blob/caam_decap_blob functions in kernel code but could you give me a suggestion for how they could use this in: a) userspace code (using the keyctl syscall I assume) b) userspace cmdline (via keyutils I assume) Many thanks, Tim